It’s the F word question that all parents now dread. “Can I go on Facebook?” your eleven year-old bullies you over dinner, declaring that absolutely everybody else in her class is not only on Facebook, but also on Twitter as well as Bebo and Orkut and other peculiarly named social networks.

So how should parents in today’s social media age deal with the F word question? Is social networking bad for children’s brains? Should we allow our kids to freely expose their identities on the Internet?

Cyber-crime just doesn't pay like it used to. Security researchers say the cost of criminal services such as distributed denial of service, or DDoS, attacks has dropped in recent months. The reason? Market economics.

Criminals have gotten better at hacking into unsuspecting computers and linking them together into so-called botnet networks, which can then be centrally controlled. Botnets are used to send spam, steal passwords, and sometimes to launch DDoS attacks, which flood victims' servers with unwanted information.

A survey of 16 to 24 year olds has found that 75% of them feel they "couldn't live" without the internet. The report, published by online charity YouthNet, also found that four out of five young people used the web to look for advice.

About one third added that they felt no need to talk to a person face to face about their problems because of the resources available online. The survey looked at how the web influences the well-being of people aged between 16 and 24.

Internet users in the North East of England have the most nervous attitude towards the web, according to research that highlights the country's "digital divide".

Online engagement will soon replace social class as the most powerful determiner of economic success, damaging the career prospects of internet refuseniks, according to the social anthologist who analysed the survey. Nearly one-third (31 per cent) of in the North East are reluctant to use the internet for anything more than sending email and occasional browsing, higher than the national average of 23 per cent.

Twitter users should refrain from changing their log-in data until further notice or else risk getting locked out of their accounts. Twitter is investigating instances of users who have lost access to their accounts after modifying their usernames, passwords or e-mail addresses, the microblogging company said on Tuesday.

Until the problem is resolved, Twitter users shouldn't modify their log-in data, according to an official posting on Twitter's Status Web site. "This seems to affect new users as well as long term users," the note reads.

Studies on whether mobile phones can cause cancer, especially brain tumors, vary widely in quality and there may be some bias in those showing the least risk, researchers reported on Tuesday. So far it is difficult to demonstrate any link, although the best studies do suggest some association between mobile phone use and cancer, the team led by Dr. Seung-Kwon Myung of South Korea's National Cancer Center found.

Myung and colleagues at Ewha Womans University and Seoul National University Hospital in Seoul and the University of California, Berkeley, examined 23 published studies of more than 37,000 people in what is called a meta-analysis.

About a third of UK employees throw sensitive documents in the bin instead of shredding them, research suggests. The study also found almost three-quarters of workers felt their organisations could do more to protect their customers' sensitive information.

The data was compiled for National Identity Fraud Prevention Week. Identity fraud costs the UK more than £1.2bn annually. The UK's Fraud Prevention Service says 60,000 people have fallen victim so far this year.

Facebook has seen an impressive bump in traffic versus this time last year. For September 2009, the site claimed 58.6 percent of U.S. social networking tracking, a jump of 194-percent over the same period last year. Twitter's increase, meanwhile, was downright absurd, jumping 1,170 percent over the past year.

In September 2008, Facebook recorded a 19.94 share, which increased to 58.59 percent for Sept. 2009. MySpace, by contrast, dominated the social-networking sites last September, with a 66.8 percent share. Since then, however, MySpace's market share has plunged to 30.3 percent, still leaving it second in U.S. traffic.

For the fourth time this year, Adobe has admitted that hackers used malicious PDF documents to break into Windows PCs.

The bug in the popular Reader PDF viewer and the Acrobat PDF maker is being exploited in "limited targeted attacks," Adobe said yesterday. That phrasing generally means hackers are sending the rigged PDF documents to a short list of users, oftentimes company executives or others whose PCs contain a treasure trove of confidential information.

Security researchers are warning that Web-based applications are increasing the risk of identity theft or losing personal data more than ever before.

The best defense against data theft, malware and viruses in the cloud is self defense, researchers at the Hack In The Box (HITB) security conference said. But getting people to change how they use the Internet, such as what personal data they make public, won't be easy.

Scammers have grabbed the Hotmail passwords that leaked to the Web and are using them in a plot involving a fake Chinese electronics seller to bilk users out of cash and their credit card information, a security researcher said.

"We've seen a 30% to 40% increase in these types of spam messages in the last several days," said Patrik Runald, senior manager of Websense's security research team. "By 'these types of spam,' I mean messages that are advertising great consumer electronics bargains, such as cameras and computers."

1. There's always a friend's computer. 2. They're a form of censorship. 3. They give you a false sense of security. 4. Kids resent them -- and you. 5. Kids can defeat them. 6. They catch too much. 7. They don't catch everything.

Most parental control programs use a combination of filtering techniques to block access to unwanted sites. But each method is vulnerable, and none promises 100% accuracy. Text-based filters can't really determine the context of words or phrases, so they can block access to perfectly acceptable sites. Words like "sucking," for example, might get caught in the filter and prevent your kid from researching, say, mosquitoes.

Meet "network man." He has basic desires of his own, but has many arbitrary preferences, such as in music or clothes, that have been influenced by the people he knows. Network man's likes and dislikes, in turn, affect the behavior of his friends, and their friends, and their friends.

People have profound influences on each other's behavior within three degrees of separation, the authors find. That means that your friends, your friends' friends, and your friends' friends' friends may all affect your eating habits, voting preferences, happiness, and more. At the fourth degree, however, the influence substantially weakens.

The head of the U.S. Federal Bureau of Investigation has stopped banking online after nearly falling for a phishing attempt. FBI Director Robert Mueller said he recently came "just a few clicks away from falling into a classic Internet phishing scam" after receiving an e-mail that appeared to be from his bank.

In phishing scams, criminals send spam e-mails to their victims, hoping to trick them into entering sensitive information such as usernames and passwords at fake Web sites.

IPhone lovers and other smartphone users should take heed: A security researcher showed ways to spy on a BlackBerry user during a presentation Wednesday, including listening to phone conversations, stealing contact lists, reading text messages, taking and viewing photos and figuring out the handset's location via GPS.

And ironically, Sheran Gunasekera, head of research and development at ZenConsult, said the BlackBerry is one of the most secure smartphones available, in some ways better than the iPhone.

Investigators in the United States and Egypt have smashed a computer "phishing" identity theft scam described as the biggest cyber-crime investigation in US history, officials said Wednesday.

The Federal Bureau of Investigation said 33 people were arrested across the United States early Wednesday while authorities in Egypt charged 47 more people linked to the scam. A total of 53 suspects were named in connection with the scam in a federal grand jury indictment, the FBI said.

Privacy and security are foundational to health care reform. Patients will trust electronic health care records only if they believe their confidentiality is protected via good security.

As vice chairman of the federal Healthcare Information Technology Standards Committee, I have been on the front lines in the debate over the standards and implementation guidance needed to support the exchange of health care information. Over the past few months, I've learned a great deal from the committee's privacy and security workgroup.

The social networking site said that its security teams had noticed an increase in scams where people's login information is collected through phishing sites, and then their accounts are accessed without permission to ask friends for money.

"While the total number of people who have been impacted is small, we take any threat to security seriously and are redoubling our efforts to combat the scam," The attacks, known as 419 scams, involve a fraudster accessing Facebook accounts and posing as the account owner.

Microsoft blocked access to thousands of Hotmail accounts in response to hackers plundering password information and posting it online.

Cyber-crooks evidently used "phishing" tactics to dupe users of Microsoft's free Web-based email service into revealing account and access information, according to the US technology giant. Phishing is an Internet bane and involves using what hackers refer to as "social engineering" to trick people into revealing information online or downloading malicious software onto computers.

In a somewhat unusual data breach, hackers recently stole the login credentials of an unknown number of customers of payroll processing company PayChoice Inc., and then attempted to use the data to steal additional information directly from the customers themselves.

Hackers broke into the site and managed to access the real legal name, username and the partially masked passwords used by customers to log into the site. They then used the information to send very realistic looking phishing e-mails to PayChoice's customers directing them to download a Web browser plug-in to be able to continue using the onlineemployer.com service.

US Homeland Security Secretary Janet Napolitano said Thursday that her department has received the green light to hire up to 1,000 cybersecurity experts over the next three years.

Kicking off "National Cybersecurity Awareness Month," she said the new recruits would "help fulfill the department's broad mission to protect the nation's cyber infrastructure, systems and networks." "Effective cybersecurity requires all partners -- individuals, communities, government entities and the private sector -- to work together to protect our networks and strengthen our cyber resiliency," Napolitano said.

"We were at a restaurant for my mom's birthday. I looked over and there are my daughter and my oldest son texting, holding their phones under the table," said the mom of four in Lewiston, Idaho. "I just came unglued. I was like, `Are you kidding? You're at your grandma's birthday party. Put those phones away now!'"

We all know teens love their gadgets — more for texting than talking. But the devices are posing some new challenges for parents. How can they teach their tech-savvy kids some electronic etiquette? So far, parents are learning on the fly, imposing new rules for their young offenders such as "no texting at dinner."

A long-time critic of the video game industry has sued Facebook for US$40 million, saying that the social networking site harmed him by not removing angry postings made by Facebook gamers.

Thompson is best know for bringing suit against Grand Theft Auto's Take Two Interactive, Sony Computer Entertainment America, and Wal-Mart, arguing that the game caused violent behavior. In 2005 episode of CBS's 60 Minutes, Thompson likened the popular video game to a "murder simulator" and blamed it for the 2003 shooting deaths of two police officers and a 911 dispatcher in Fayette, Alabama.

It's your birthday. And thanks to your Facebook profile, everybody knows that. Your wall fills up with well wishes from hundreds of "friends." Sure, it's nice to be noticed. But security experts are skeptical about whether sharing information, such as birthdays, with a broad audience is a bright idea. "It's all about providing the bad guy with intelligence," said Robert Siciliano, CEO of IDtheftsecurity.com.

Many people use their birthdate in passwords and personal identification numbers, and security questions often ask for it to resend a lost password. So broadcasting a birthdate could help cybercriminals pose as others as they log on to various Web sites, experts warned.

Cybersecurity researchers often scare the IT world with tales of brilliant and devious hacks: encryption cracking techniques, wi-fi booby-traps and undetected vulnerability data sold on the black market. But the most common path cybercriminals use to gain access to victims' PCs today, according to a new report, is far more mundane: buggy software that users and IT administrators fail to patch for months, long after fixes are publicly available.

The study to be released Tuesday by the security-focused SANS Institute states that the cybersecurity community is facing an epidemic of unpatched software, particularly widely used applications like Adobe Flash, Java and Microsoft programs like Word and PowerPoint.

Microsoft on Tuesday began serving up scam warnings with Bing search results for topics such as fixing credit scores or rescue from home foreclosure that are prime material for online cons.

Microsoft worked with the US Federal Trade Commission (FTC), Postal Inspection Service, and Western Union to provide public service announcements (PSAs) in the form of advertising posted on relevant Bing results pages. Targeted in the campaign are key words related to searches for information about foreclosure rescue offers; promises to fix credit problems, and "lottery scams" in which people are told they've won prizes but must pay to collect.

Web surfing is no longer a solo affair. Facebook, Twitter, and other social networks have quickly become an integral part of the online culture, and with them comes a whole new array of potential security threats.

Social networking is built on the idea of sharing information openly and fostering a sense of community. Unfortunately, an online network of individuals actively sharing their experiences and seeking connections with other like-minded people can be easy prey for hackers bent on social-engineering and phishing attacks. It's important to be aware of the threats, and to maintain a healthy skepticism in your online interactions.

The US Secret Service is trying to identify the people who launched an online poll at Facebook asking whether US President Barack Obama should be assassinated. Facebook on Monday shut down the user-generated poll, which was titled "Should Obama be killed?" and offered answer choices of yes, no, maybe, and "If he cuts my health care."

"Once we found out about it, we worked with Facebook to have it removed," Secret Service spokesman Malcolm Wiley told AFP. "We are certainly investigating; just like we would with any threat case." More than 750 Facebook users had reportedly cast votes by the time the poll was yanked from the wildly popular online social networking community.

A network of Russian malware writers and spammers paid hackers 43 cents for each Mac machine they infected with bogus video software, a sign that Macs have become attack targets, a security researcher said yesterday.

In a presentation Thursday at the Virus Bulletin 2009 security conference in Geneva, Switzerland, Sophos researcher Dmitry Samosseiko discussed his investigation of the Russian "Partnerka," a tangled collection of Web affiliates who rake in hundreds of thousands of dollars from spam and malware, most of the former related to phony drug sites, and much of the latter targeting Windows users with fake security software, or "scareware."

Next time you're recovering from trip to the emergency room, keep an eye on the young doctors tending to you. They might be chatting about your case on Twitter, Facebook, YouTube, and blogs.

A survey of medical schools published in the Journal of the American Medical Association found that 13 percent of respondents reported breaches of doctor-patient confidentiality, and 60 percent reported "unprofessional content" posted online.

The information presented within this blog comes from various organizations around the world. ITU encourages users to seek more detailed information from the original source through the links provided.
Links to third-party websites are provided for the convenience of all users. The ITU is not responsible for the accuracy, currency or the reliability of the content on these third-party websites. ITU does not offer any guarantee in that regard nor does ITU endorse the third-party organizations, their sites or content.